General
-
Target
PAYMENT_SLIP.exe
-
Size
682KB
-
Sample
200716-p4y1h9gjvx
-
MD5
585b758048738f9b6c7fdccda7670e7e
-
SHA1
62a9445cb0e972e527563c1a039f62248ebf7fcf
-
SHA256
aacbdc4e71933d3b1315ffaf853ae20db13b8ba6442f250d8207ec1018d1ac53
-
SHA512
ef38c90063b0bdf37613162374d2dac74a1a639def65a93eaa4663ed0bd20f3a499233e19500d48737e5a98b0b5cb1602fe83ad0415a23fc7c076c2016e2f1bc
Static task
static1
Behavioral task
behavioral1
Sample
PAYMENT_SLIP.exe
Resource
win7v200430
Malware Config
Targets
-
-
Target
PAYMENT_SLIP.exe
-
Size
682KB
-
MD5
585b758048738f9b6c7fdccda7670e7e
-
SHA1
62a9445cb0e972e527563c1a039f62248ebf7fcf
-
SHA256
aacbdc4e71933d3b1315ffaf853ae20db13b8ba6442f250d8207ec1018d1ac53
-
SHA512
ef38c90063b0bdf37613162374d2dac74a1a639def65a93eaa4663ed0bd20f3a499233e19500d48737e5a98b0b5cb1602fe83ad0415a23fc7c076c2016e2f1bc
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Uses the VBS compiler for execution
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-